The security of symmetric key primitives comes from their exposure to public scrutiny in the context of competitions such as Advanced Encryption Standard, securehashalgorithm3, or currently CAESAR. However, due to ...
详细信息
The security of symmetric key primitives comes from their exposure to public scrutiny in the context of competitions such as Advanced Encryption Standard, securehashalgorithm3, or currently CAESAR. However, due to the increasing number of primitives subjected to these competitions, the quality of the scrutiny relies on the availability of automated tools. Although SAT solvers have already proved useful for the automated analysis of these primitives, there is a lack of practical software tools for this purpose. This study describes a framework that aims to make SAT-based analyses accessible to cryptographers. The framework is implemented in a free open-source tool called CryptoSAT which is available in the public domain.
Creating digital content and distributing them has become much easier and convenient nowadays, where the digital content creator can create the content and also distribute their work to others from anywhere with the h...
详细信息
Creating digital content and distributing them has become much easier and convenient nowadays, where the digital content creator can create the content and also distribute their work to others from anywhere with the help of internet. This also has the risk as the content is distributed using internet, the risk being copyright infringement and illegal distribution of the content. To avoid these types of risks the content creators are opting towards the help of digital rights management. The digital rights management team provides help and support to the content creators in cases where their work is illegally copied or distributed. To get the digital content copyrighted is also not an easy task as it consumes time and money. The proposed model overcomes these issues by integrating digital signature, structure similarity index measurement (SSIM) and blockchain technology in the digital rights management life cycle. The digital signature is used to uniquely identify the user and the related information can be traced back to the user using digital signature, and the copyright is provided using the SSIM method. The SSIM value can be in the range of -1 to 1 where 1 denotes that both the media files are identical and the system updates this information so that all the participant can view this information. If the SSIM value after comparing both the media files is -1 then the both images are unique and authentic, then the copyright is provided for the media file and this information is updated in the system as well as Ethereum blockchain. This makes the system more secure, robust and transparent.
Security services have become an inseparable feature of almost all digital transactions. A crucial module of these scheme isintegrity, which is performed using a cryptographic hash function. securehashalgorithm can ...
详细信息
Security services have become an inseparable feature of almost all digital transactions. A crucial module of these scheme isintegrity, which is performed using a cryptographic hash function. securehashalgorithm can be an efficient hashing ***-3 is the most recent and efficient securehashalgorithm. Keccak has been chosen as the official algorithm for SHA-3 in2012. In this paper we propose a modification on the design of securehashalgorithm (SHA-3) on Xilinx Field ProgrammableGate Array (FPGA) device. In order to provide reliable architecture for this algorithm, a concurrent error tolerant scheme forSHA-3 is used. A system based on the combination of SHA-3 and error tolerant scheme is also described. Simulation resultsshows, an efficiency in area and delay of SHA-3 designs.
暂无评论